added a sent_oplock_break element to Files[] as a paranoia check so we
commite360c79c9cec681c4609783019749773d3e79386
authorAndrew Tridgell <tridge@samba.org>
Sat, 29 Nov 1997 02:40:31 +0000 (29 02:40 +0000)
committerAndrew Tridgell <tridge@samba.org>
Sat, 29 Nov 1997 02:40:31 +0000 (29 02:40 +0000)
treea6c974bd969c313f61643382570717108b1ae2d0
parente89611985b35155770648c8f16ddd19acfb5ee13
added a sent_oplock_break element to Files[] as a paranoia check so we
can't sent a oplock break twice on the same file.

changed some debug levels in the oplock code to level 0 so we can
track down a bug

zero the returned Files[] entry in find_free_file()

don't try to overcome client bugs in the handling of non-encrypted
passwords if in server level security mode

added paranoid null termination of password buffers

slight change to my ajt_panic() routine
source/include/smb.h
source/lib/util.c
source/smbd/reply.c
source/smbd/server.c